Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-1999-1491Redhat Linux vulnerability

6 documents5 sources
Severity
7.2HIGHNVD
EPSS
0.4%
top 38.33%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 2
Latest updateApr 16

Description

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

NVDredhat/linux2.1

Patches

🔴Vulnerability Details

3
VulDB
Red Hat Linux 2.1 abuse.console privileges management (EDB-19279 / BID-354)2026-04-16
GHSA
GHSA-33qc-p77x-82rf: abuse2022-04-30
CVEList
CVE-1999-1491: abuse2001-09-12

💥Exploits & PoCs

2
Exploit-DB
Xt Library - Local Privilege Escalation1996-08-24
Exploit-DB
RedHat Linux 2.1 - 'abuse.console' Local Privilege Escalation1996-02-02
CVE-1999-1491 — Redhat Linux vulnerability | cvebase